At the Gartner Data Center, Infrastructure & Operations Management Conference this week in Las Vegas, I presented a new session called, “Infrastructure as (Secure) Code.” This talk tackled the benefits and challenges of having most of your infrastructure represented as code of varying forms. This is a scenario that’s playing out in even the most…

It’s been a week since re:Invent, and the dust is still settling. The content from the event is being posted quickly. You can find all of the videos (with a few still coming), audio podcast versions, and slides from the sessions online. The challenge here is the how to process this massive amount of content….

Wow. As expected, re:Invent 2014 was a whirlwind. Last week, AWS launched nine new services. Well, eight new standalone services and a new database engine that is important enough to be called a new service. Trend Micro was a diamond sponsor at the event, and we had a huge presence at the event. For this post,…

Build with confidence from marknca on Vimeo. As an app developer, you know that security is important, but sometimes you can lose perspective as to why it’s important. Your users trust that when they share their data with your app, it will be safe. That trust is critical to your success and to your users’…

This is the 4th & final post in a short series on the shared responsibility model for security in the AWS Cloud. Please take a few minutes to read the others: part 1, part 2, and part 3 Shellshock Shellshock (which entails a number of CVE’s), is a bug that affects bash, a command line…

I don’t usually do posts that focus on products, partnerships, or really anything around the business side of Trend Micro. I like to stick to technical education. However, I wanted to point out a joint partnership that we recently launched with CloudNexa, a premier AWS consulting partner (FYI, Trend Micro is an AWS advanced technology…

This is the third post in a short series on the shared responsibility model for security in the AWS Cloud. Please take a couple of minutes to read part 1 and part 2. POODLE Another bug with a catchy name, POODLE, is actually an acronym. It stands for “padding oracle on downgrade legacy encryption.” This…

In last week’s post, we explored the shared responsibility model for security in the AWS cloud. Over the next couple of weeks, we’re going to dive into specific examples that show how the model works for those of us working in this environment. Re:Boot Near the end of September, there was a critical bug discovered…

Today AWS announced the debut of a new region: Frankfurt, Germany. This is the 11th region for AWS, and it offers the wide range of services you would expect. The new region has two availability zones and three edge locations (for Amazon Route 53 & Amazon CloudFront). EU Data Protection Laws Frankfurt starts out of…

Security in the cloud is a shared responsibility. I’ve written about this before, but with AWS re:Invent right around the corner, now is a good time to explore this idea further and see what the model looks like when applied in production. The Model Before we dive in, let’s make sure we’re all working with…